# inputs (ring signatures)
Each input uses a ring of 16 public keys. The real spender is hidden among decoys.
Key Image
5047cddddb8a9f033fa11f855ce621dd2c555aaf92da48e8128c834fdbf67c4d
Pseudo Output
5e0a81edf42af7216918abc967e7603d3104a60e988bd1062176ff38eb66ba40
# outputs (stealth addresses)
Amounts are hidden by Pedersen commitments. Range proofs ensure validity without revealing values.
Stealth Address
6e01c93c7fe0292e23006538f3423e33b8774c946b03180cadb7c09745aecb57
Commitment
e654ad27246aaf0ef34a7160394827e31d4af892af62f06cdae7425c710d7613
Range Proof
672 bytes (Bulletproof)
Memo
5570cb9c53691cc36044be21b3ed989834a5b259dfa4e50cb145b76934378f9e136cd21a9f756d30eed0405f67b8cd706da630caac5937bf07b6e956e8eb21d497be2ff2be56a7ad5c9bb70e54e631b72a876827c09ebf5b95f45c0325e13eb05caf1c989f54385c5a3520c494e431ece6ee0155f2c089a53e30aa88443b9736 (encrypted)
Stealth Address
e48b082fcdd9f74c0e2ec18b9b1e1a0b95bef82dada398af52b82617d332e71a
Commitment
82ea1bac8cd5aa65d4d904015887f7abf92ed5659beab5ea979ce38f7a802103
Range Proof
672 bytes (Bulletproof)
Memo
fa882be7d7fe6a444e3122371ed10971cf72628463148f9f623e04dcfc9dac9e28e0deef345e0a96ba5e2393b4183f8ea9e5a386c9e56140a522011d44042388715a3ae1dfa05b55223a8b752d7865c3fe72b189be96da9fd5a57eea84f39c1ac43a4208a407cd9281876e0b55243509456beaac5969f064dab3b03ecc0932fa (encrypted)
Stealth Address
2046dd4511bf4edfd5eac21c8cb33b56b38cf5c6c2034ec9cfe571b2da3f181d
Commitment
b25d9aeb863ec18189f46c004a0c9981c0e8cf2638cf52665564c0f9e5e56533
Range Proof
672 bytes (Bulletproof)
Memo
9533155f8ba873f8b4726448506118cd2de159e2ab8649bf23bf6ac03a551d3a12c48330ef3e4715e88191f72d576382b027170312c528b69c9d2718c6742828dca49b229a1ad609c0a6d05e1c70882ab469c9cf34332047ae35f2ae9fb1aa83a9f903d584b32ef0f4e3395a253a00f73ad3fa5f2b460e749f8460b76ecf958b (encrypted)